Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Windows Vulnerability found in your Calculator? Here’s What You Should Know

A Windows Vulnerability found in your Calculator? Here’s What You Should Know

Sometimes security breaches and hacking attacks come from the most unlikely of sources, even going so far as to utilize trusted applications to infect an endpoint or network. This is the case with a new phishing attack which uses the Calculator application that comes built-in with Windows in a very creative way. This is just one example of how hackers have been forced to innovate to combat the increasingly secure systems which businesses and users rely on today, and it should be a testament as to why you can never be too careful.

What is the Threat?

A security researcher who goes by ProxyLife on Twitter has reportedly discovered that there are several strains of malware and phishing attacks utilizing an outdated version of Microsoft’s Calculator application to find their way onto your network and launch their attacks—specifically the Windows 7 version of Calculator. The way that it works is that a cybercriminal tricks the user into downloading an ISO disc image which is disguised as a PDF or other similar file. This ISO contains a shortcut to an opened version of the Calculator application.

The Windows 7 Calculator can use what are called Dynamic Link Libraries in the same folder rather than defaulting to Windows’ system default libraries. The Calculator then runs the library, which is infected with malware. Later versions of Calculator do not have this capability, hence why an older version is necessary. Since Windows thinks that Calculator is a legitimate application, opening it in this way doesn’t set off any red flags within the system.

Should You be Worried?

At the end of the day, this is largely an obscure threat that sees hackers using the tools at their disposal in creative and different ways. It is not yet known if Microsoft has issued an update to Defender to put a stop to these types of attacks, but the long and short of it is that you probably won’t encounter this specific threat, as long as you are using proper security practices while browsing the Internet or checking your email.

Still, the idea that threats can use trusted and known applications in this way can make things a bit of a hassle for your IT team. These types of attacks might bypass the defenses built into your operating systems, but they can be caught if you are proactively monitoring your infrastructure for abnormalities. These abnormalities can then be contained, isolated, and eliminated. Of course, the problem here is that you likely wouldn’t find this type of threat if you weren’t actively looking for it—which is where we come in.

Proactively Monitor Your Network with Our Services

We know that it can be a challenge to keep your network safe. That’s why we make it easy with our remote monitoring services. Combined with comprehensive security solutions like a firewall, antivirus, spam blocker, and content filter, you’ll find that your network has never been safer. To learn more about what we can do for your business, contact us today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 13 June 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Computer Phishing Email Workplace Tips IT Services Hosted Solutions Users Collaboration Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Microsoft Cybersecurity Passwords Communication Data Backup Saving Money Smartphone Backup Managed Service Smartphones VoIP Android Business Management Mobile Devices communications Upgrade Disaster Recovery Data Recovery Browser Social Media Windows Managed IT Services Microsoft Office Tech Term Current Events Network Remote Internet of Things Productivity Automation Facebook Artificial Intelligence Gadgets Cloud Computing AI Covid-19 Miscellaneous Server Managed Service Provider Remote Work Outsourced IT Information Holiday Spam Compliance Encryption Training Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Wi-Fi Windows 10 Business Technology Virtualization Apps Data Security Mobile Office Vendor Two-factor Authentication IT Support Budget Managed Services Voice over Internet Protocol Employer-Employee Relationship Apple Networking App BYOD Mobile Device Management Gmail Chrome Conferencing How To BDR Hacker Avoiding Downtime HIPAA Marketing Computing Applications Information Technology Access Control Office 365 Tip of the week WiFi Retail Storage Password Bring Your Own Device Healthcare Managed IT Services Computers Website Operating System Router Virtual Private Network Risk Management Health Help Desk Analytics Office Tips Augmented Reality Big Data Social Telephone Remote Workers Scam Data loss Customer Service Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Remote Monitoring End of Support Microsoft 365 Vulnerability Vendor Management Cybercrime Solutions Physical Security Display Firewall Printer Paperless Office Infrastructure Monitoring Windows 11 The Internet of Things 2FA Document Management Excel Professional Services Virtual Machines Managed IT Service Maintenance Downloads Antivirus Sports Mouse Customer Relationship Management Licensing iPhone Administration Entertainment Vulnerabilities Hacking Presentation Data Privacy Robot Telephone System Images 101 Wireless Technology Cost Management Settings Multi-Factor Authentication Mobility Wireless Printing Content Filtering IT Management VPN YouTube Meetings Word Cryptocurrency Employees Integration User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop LiFi Data storage Safety Holidays Smart Technology Data Storage Outlook Supply Chain Machine Learning Video Conferencing Money Saving Time Humor Managed Services Provider Workplace Hacks Server Management Gig Economy Application Scary Stories Private Cloud Identity Identity Theft Smart Tech Internet Service Provider Fun Teamwork Hiring/Firing Superfish Bookmark IBM Deep Learning Download Regulations Compliance Twitter Alerts Evernote Paperless Co-managed IT Error Memes Education Connectivity Net Neutrality Social Engineering Break Fix SQL Server Technology Care Browsers Upload Financial Data Remote Computing History Business Communications Multi-Factor Security Scams Mobile Computing Social Network Smartwatch IT Competition Tablet IoT Procurement Search Dark Web Azure Hybrid Work Best Practice Trends Telework Alert Cyber security Tech Human Resources Dark Data Google Calendar Cables Managed IT Customer Resource management CES Buisness File Sharing Regulations Communitications IT solutions Star Wars Supply Chain Management How To Microsoft Excel Legal Data Analysis Business Growth Gamification FinTech User Notifications Staff Term Google Apps Legislation IT Maintenance Travel Social Networking IT Assessment Google Maps Flexibility Cortana Value Business Intelligence Techology Fileless Malware IP Address Alt Codes Content Organization Wearable Technology Shortcuts Comparison Ransmoware Health IT Digital Security Cameras Downtime Unified Threat Management Motherboard Smart Devices Hosted Solution Assessment Remote Working Permissions Memory Vendors Unified Threat Management Directions Typing Recovery Data Breach Google Play Be Proactive Network Congestion Specifications Workforce Videos Hard Drives Electronic Health Records Domains Internet Exlporer Knowledge Fraud Wasting Time Threats Google Drive User Error Microchip Username Trend Micro Security Cameras Workplace Strategies 5G Black Friday Meta Refrigeration Point of Sale Software as a Service Public Speaking Unified Communications Database Experience Managing Costs Amazon Google Docs Lithium-ion battery Bitcoin Network Management Running Cable Tech Support IT Technicians eCommerce SSID Entrepreneur Monitors Cyber Monday Virtual Assistant Outsource IT Google Wallet Proxy Server Cookies Surveillance Tactics Hotspot Virtual Machine Environment Media Windows 8 Reviews Laptop Websites Mirgation Medical IT Development Transportation Small Businesses Drones Undo Nanotechnology Addiction Electronic Medical Records Language Hypervisor Displays SharePoint PowerPoint Management Shopping Halloween Chatbots Optimization Writing Distributed Denial of Service Employer/Employee Relationships Outsourcing Lenovo Screen Reader Service Level Agreement PCI DSS Virtual Reality Computing Infrastructure Navigation

Blog Archive